Re: Setting up webserver for https??

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2021-12-15 at 00:37 +1000, Michael D. Setzer II:
> Just to clarify. dyndns.org only links my sites name to the 
> public IP address I get from ISP. Has been the same exact 
> IP for at least 2 years, but is a static one?? But works 
> fine.

If they don't advertise it as static ("that's a feature!") it probably
isn't.  It's highly likely that they set the lease on the IP with a
reasonable time period so that you're going to get the same IP if you
temporarily disconnect for a short period.  You may get the same one if
you disconnected for a longer period, but there's probably some time
period where you lose the lease and get a different IP.

At one stage my ISP would give you the same one unless you disconnected
for quite a lengthy period, now it's only a few minutes.  I suspect
that may be due to how they tell customers who complain about network
faults to reboot and reset everything, and hope that by the time they
reconnect they end up with a different address that goes slightly
different through their network, and the fault goes away (for that
customer) without the ISP actually having to do anything.


> On my internal network, I can connect to the server using 
> https and it does on port 443 just fine, just gives a 
> message about the certificate isn't confirmed by a 3rd 
> party??

Common enough with cheap or free certificates.  You generally have to
pay to get a pre-approved one.


> But otherwise works. Checked my router, and I have port 
> 8081 mapped from the outside to the inside port 8081 on 
> machine (how httpd setup). and it works fine. port 80 is 
> blocked by ISP??

Many ISPs block customers running services.  They'll either charge
extra for the feature, or simply don't want to deal with the headaches
that badly managed servers can wreak.

> Also, found I have port 8443 mapped to 443 on machine, but nothing
> gets thru, so assume that port is blocked. Sent message to ISP, but
> they haven't gotten back?

443 is the only standard port used for HTTPS.  Although some nerds may
suggest that 8443 is an alternative HTTPS web browsing port, it is not.
The numbers don't suggest purpose (i.e. something with 443 in it,
somewhere, is not HTTPS because of those numbers, and something
starting with 8 is not web-related because of those numbers).  While
computer users might like to pick them for human-obvious reasons,
there's nothing even semi-official about it.

As with port 80, ISPs do various things to other common port numbers,
to allow or deny services for their clients.  You can try non-standard
ports, they may allow them through, web-browsers may allow them.  See
how your browser fares trying to connect to other ports internally,
then you can try using them externally.  You might have to go higher
up.  But some ISPs inspect packet content, regardless of port, and will
mess up any kind of HTTP traffic coming into you (which also can
disrupt things like file transfers in instant messengers, ICQ, MSN,
Jabber, and others, since they often use the same hyper-text transfer
*PROTOCOL* to do the work).

There are lists of well-known and registered ports.  They don't
absolutely reserve ports for specific functions, but traditionally
certain services use certain ports, and can be expected to be found
there.  When you use other ports, you have to be able to either include
them in the address, or somewhere in the configuration.  And be
prepared to deal with conflicts.

Ports 0 to 1023 are the most well-known ports, and your own operating
system networking will often require special privileges to be able to
use services on them (e.g. an ordinary user can't run the mail server
in their own account, on the standard mail server port numbers, it
needs a server kind of account).

Ports 1024 to 49141 have a lot pre-registered uses, and if I remember
correctly, Linux won't restrict ordinary users from using them.  Though
you might have to manually twiddle firewall and SELinux rules (well, I
say "might" but in a security concious installation, you almost
definitely will have to manually configure something allow it).

Ports 49152 to 65535 are known as dynamic, private, or ephemeral ports,
with no specified use (though there are some applications which are
known to make use of some of these, they're not reserved for their
exclusive use).  They are expected to be used at the whim of any
software communicating across a network.  Though, again, to run a
server on them you *might* (but probably will) have to manually twiddle
your firewall and SELinux rules.

e.g. When you browse a webserver on port 80 (the server's port 80),
your end will use one of these ephemeral ports to connect to their port
80.  Depending on your OS there will be some scheme as to how it picks
them.  I've used far too many OSs over the decades to remember which
ones do what.  They might start at the lowest un-used one and work
upwards, or the highest free one and work down, or pick at random (as a
privacy or pseudo-security technique of making your computer's
networking more unpredictable to miscreants).

I'm not sure how well different OSs handle you trying to run a service
on a port number that they might expect to be able to use by their
choice, but a TCP/IP stack ought to be able to determine whether a port
is in use by *something* and not try to double-up on it.  Anything that
doesn't check and just blithely assumes it can do what it wants is
bound to have some kind of failures.  If you were running multiple
servers (web servers, peer-to-peer, etc), it'd be your responsibility
to set each one up to work in different ranges.

Since you're experimenting for your own purposes, there's no reason why
you can't just try some random high port number and see what happens.

NB:  Anywhere I've said that your ISP or OS may impose restrictions on
the use of port numbers, remember that your modem/router might impose
its own limitations, too.

> Give the address as sitename:8081 with http, but don't 
> know if browser is changing it to https somehow?

If the browser has a HTTPS everywhere plugin, or built-in, feature,
that could be the cause.  But they really should allow a HTTP fallback
when HTTPS doesn't work.  Though, I suppose, even that could fail if
the webserver gives some kind of initial response, so the browser
doesn't try falling back.  Akin to how years ago many websites
complained you had JavaScript turned off if you didn't accept a cookie,
or vice versa, instead of testing cookies with cookies and scripting
with scripting (programmers making dumb assumptions).

I'd read, elsewhere, about Google Chrome enforcing HTTPS with certain
domain names (e.g. with ".dev" top-level-domains).

As I've said, I'm not pleased with the HTTPS-everywhere push, it's not
always appropriate, and programmers are notorious for making dumb
assumptions.

-- 
 
uname -rsvp
Linux 3.10.0-1160.49.1.el7.x86_64 #1 SMP Tue Nov 30 15:51:32 UTC 2021 x86_64
 
Boilerplate:  All unexpected mail to my mailbox is automatically deleted.
I will only get to see the messages that are posted to the mailing list.
 
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure



[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux